| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910326250903321 |
|
|
Autore |
Prakash S. Bisen |
|
|
Titolo |
Immune Response Activation and Immunomodulation / / Rajeev K. Tyagi, Prakash S. Bisen, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
IntechOpen, 2019 |
|
London : , : IntechOpen, , [2019] |
|
©2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-83962-135-4 |
1-78985-152-1 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xii, 165 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Immune response - Regulation |
Immune system |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Immune Response Activation and Immunomodulation has been written to address the perceived needs of both medical school and undergraduate curricula and to take advantage of new understandings in immunology. We have tried to achieve several goals and present the most important principles governing the function of the immune system. Our fundamental objective has been to synthesize the key concepts from the vast amount of experimental data that have emerged in the rapidly advancing field of immunology. The choice of what is most important is based on what is most clearly established by experimentation, what our students find puzzling, and what explains the wonderful efficiency and economy of the immune system. Inevitably, however, such a choice will have an element of bias, and our bias is toward emphasizing the cellular interactions in immune response by limiting the description of many of the underlying biochemical and molecular mechanisms to the essential facts. This book gives an insight into the role of cytokines in activating immune response during pathogenic invasion. Immunomodulation, aryl hydrocarbons, the role of the protein defensin and nucleated cells in |
|
|
|
|
|
|
|
|
|
|
|
|
|
provoking immune response, Bcl protein/gene-based apoptotic pathways, and plant-derived phytochemical-mediated immune response are all central themes of this book. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910299252203321 |
|
|
Titolo |
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (326 p.) |
|
|
|
|
|
|
Collana |
|
Advances in Information Security, , 2512-2193 ; ; 56 |
|
|
|
|
|
|
Disciplina |
|
004 |
004.6 |
005.7 |
005.8 |
005.82 |
|
|
|
|
|
|
|
|
Soggetti |
|
Data protection |
Cryptography |
Data encryption (Computer science) |
Computer networks |
Application software |
Data and Information Security |
Cryptology |
Computer Communication Networks |
Computer and Information Systems Applications |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic |
|
|
|
|
|
|
|
|
|
|
|
Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survery of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference. |
|
|
|
|
|
|
|
| |